Re: Gave up on my ISP, trying to get GMail to work but get - host smtp.gmail.com[64.233.168.108] said: 530-5.5.1 Authentication Required.

2019-06-23 Thread Chris Pollock
On Mon, 2019-06-24 at 08:00 +1200, Peter wrote:
> On 24/06/19 3:38 AM, Chris Pollock wrote:
> > I still have some that are going to /var/spool/mail/nobody however.
> > Headers below:
> 
> And your logs show what exactly?
> 
> 
> Peter

The pastes are from my mail.log

https://pastebin.com/2kn42CRa

As I said earlier it all seems to be working correctly now.

-- 
Chris
KeyID 0xE372A7DA98E6705C
31.11972; -97.90167 (Elev. 1092 ft)
16:50:32 up 2 days, 23:00, 1 user, load average: 1.25, 1.20, 1.01
Description:Ubuntu 18.04.2 LTS, kernel 4.18.0-22-generic


signature.asc
Description: This is a digitally signed message part


Re: Smptd intruder

2019-06-23 Thread Wietse Venema
John Plate:
> Hi
> 
> I introduced "smtpd_reject_unlisted_sender=yes" in main.cf to avoid
> attempts to login to my smtpd.

smtpd_reject_unlisted_sender does not prevent logins.

> This morning it looks like an unknown ip-number succeded:
> 
> Jun 23 07:38:02 lunar postfix/smtpd[14806]: connect from
> unknown[185.137.111.22]
> Jun 23 07:38:05 lunar amavis[15407]: starting. /usr/sbin/amavisd-new at
> lunar.dk amavisd-new-2.10.1 (20141025), Unicode aware, LC_ALL="C",
> LANG="en_US.UTF-8"

There is no evidence of a login from 185.137.111.22.

Wietse


Re: dkim updating keys

2019-06-23 Thread Ralph Seichter
* Lefteris Tsintjelis:

> There is nothing to disappear from cache for the new key.

Lefteris, I am fully aware. As I wrote, I don't trust every caching
resolver out there to do the right thing (meaning to query for new
information while older data is still in the cache). It should happen,
but I rather wait an extra day. You may of course make your own choice,
it makes no difference to me.

-Ralph


Re: havedane dns issues

2019-06-23 Thread Thilo Molitor
> I just sent an email via the contact form.
Thanks!

> Yes, incorrect handling of empty-non-terminals.  I don't enable
> qname minimization on the unbound instance on my MTA.  Still tends
> to run into bugs like this now and then.
Yes, I now also disabled it.

- tmolitor


Re: dkim updating keys

2019-06-23 Thread Lefteris Tsintjelis

On 23/6/2019 23:25, Ralph Seichter wrote:

* Lefteris Tsintjelis:


In case DNS does not use notify then yes you should wait for the zone
refresh time in SOA (not TTL) for all slaves to sync.


I recommended the zone's TTL because it is the upper limit for all
cached data to disappear


There is nothing to disappear from cache for the new key. This is a new 
selector so all is needed is for all DNS servers to be in sync (notify 
takes care of that) and that is all. You may start using it.


Lefteris


Smptd intruder

2019-06-23 Thread John Plate
Hi

I introduced "smtpd_reject_unlisted_sender=yes" in main.cf to avoid
attempts to login to my smtpd.

This morning it looks like an unknown ip-number succeded:

Jun 23 07:38:02 lunar postfix/smtpd[14806]: connect from
unknown[185.137.111.22]
Jun 23 07:38:05 lunar amavis[15407]: starting. /usr/sbin/amavisd-new at
lunar.dk amavisd-new-2.10.1 (20141025), Unicode aware, LC_ALL="C",
LANG="en_US.UTF-8"
Jun 23 07:38:06 lunar amavis[15412]: Net::Server: Group Not Defined.
Defaulting to EGID '121 121'
Jun 23 07:38:06 lunar amavis[15412]: Net::Server: User Not Defined.
Defaulting to EUID '114'


How can I avoid this acitivty.

Thanks in advance


Re: dkim updating keys

2019-06-23 Thread Ralph Seichter
* Lefteris Tsintjelis:

> In case DNS does not use notify then yes you should wait for the zone
> refresh time in SOA (not TTL) for all slaves to sync.

I recommended the zone's TTL because it is the upper limit for all
cached data to disappear, but yes, data newly added to the zone should
usually be available sooner. My own DNS pair will deliver additions
within seconds after I make the change, but I don't quite trust every
caching resolver out there and rather wait an extra day.

-Ralph


Re: Gave up on my ISP, trying to get GMail to work but get - host smtp.gmail.com[64.233.168.108] said: 530-5.5.1 Authentication Required.

2019-06-23 Thread Peter

On 24/06/19 3:38 AM, Chris Pollock wrote:

I still have some that are going to /var/spool/mail/nobody however.
Headers below:


And your logs show what exactly?


Peter


Re: Greylisting -- current recommendations?

2019-06-23 Thread Peter

On 24/06/19 5:21 AM, A. Schulze wrote:

while running postscreen and postgrey I still see some connections deferred by 
postgrey...
no more details available on a sunday.


If you're running the after-220 tests in postscreen then these messages 
are actually deferring twice, and the fact that postgrey defers does not 
mean it caught spam, it means it may be spam and it is delaying the 
message further to try to check.  If postscreen is catching the vast 
majority of these then all you're seeing is unnecessary delay on 
legitimate mail.



Peter


Re: Greylisting -- current recommendations?

2019-06-23 Thread Peter

On 22/06/19 12:49 PM, Rich Wales wrote:

I'm running Postfix 3.1.0 on an Ubuntu 16.04 LTS system.

II'm using Postfix's postscreen filtering, including zen.spamhaus.org
(with a large score) as one of my DNSBL sites, but it's not helping in
some cases because the spam sources are not showing up on Spamhaus at
the time I get e-mail from them -- only later on.

I'm wondering if it may be worthwhile for me to enable greylisting in
some form on my server.  I'm aware of Postgrey, but I'm uneasy because
this package seems to get updated so rarely (the latest version is about
three years old).


Just enable (and use) the after-220 tests for postscreen which have 
basically the same effect as greylisting.  Postscreen with the after-220 
tests enabled basically makes postgrey obsolete.


See http://rob0.nodns4.us/postscreen.html which uses dnswl scoring to 
address some of the issues with major ESPs such as google and the 
after-220 tests.



Peter


Re: dkim updating keys

2019-06-23 Thread Lefteris Tsintjelis

On 23/6/2019 16:20, Ralph Seichter wrote:

* Esteban L.:


Trying to figure this out with as little disruption as possible.


I sugest you do the following, in order:

* Generate new key.

* Add new key's data, using a new DKIM selector, to your DNS.

* Wait for your domain zone's DNS TTL to expire (typically 1-2 days).


Yes that is the way. One detail here.

In case DNS does not use notify then yes you should wait for the zone 
refresh time in SOA (not TTL) for all slaves to sync. Just about any DNS 
now days uses notify and the new DKIM selector should be available 
within seconds after the zone reload in all authoritative domain 
servers, if all set correctly and you could use your new key almost 
immediately, if you control the reload time. In any case, you can easily 
and should verify that with a dig or an nslookup.


Lefteris


* Switch to signing with the new key.

* Wait another 1-2 days, in case messages signed with the previous key
   are still in limbo somewhere (low risk of that, but still).
* Remove old key's data from DNS.

>

As long as you make sure to use a different DKIM selector for each key,
that should suffice for a key rollover.

-Ralph


Re: dkim updating keys

2019-06-23 Thread Esteban L
Thanks Ralph.

That was the step-by-step guide I was looking for. The simplest things
are always the hardest to find information for.

Esteban
-- 
https://little-beak.com
"Doing what we can."

-Original Message-
From: Ralph Seichter 
To: postfix-users@postfix.org
Subject: Re: dkim updating keys
Date: Sun, 23 Jun 2019 15:20:42 +0200

* Esteban L.:

> Trying to figure this out with as little disruption as possible.

I sugest you do the following, in order:

* Generate new key.

* Add new key's data, using a new DKIM selector, to your DNS.

* Wait for your domain zone's DNS TTL to expire (typically 1-2 days).

* Switch to signing with the new key.

* Wait another 1-2 days, in case messages signed with the previous key
  are still in limbo somewhere (low risk of that, but still).

* Remove old key's data from DNS.

As long as you make sure to use a different DKIM selector for each key,
that should suffice for a key rollover.

-Ralph

signature.asc
Description: This is a digitally signed message part


Re: Greylisting -- current recommendations?

2019-06-23 Thread Thilo Molitor
I'm using conditional greylisting with policy-weightd and postgrey.
And another conditional greylisting if the spamassassin score is too high 
using milter-greylist.

This doesn't introduce delays for most of the incoming mails but penalizes 
zombies / mailservers with strange behaviours :)

- tmolitor


Am Sonntag, 23. Juni 2019, 13:24:59 CEST schrieb Wietse Venema:
> Matus UHLAR - fantomas:
> > >Am 22.06.19 um 02:49 schrieb Rich Wales:
> > >> Any other suggestions?
> > 
> > On 22.06.19 14:43, A. Schulze wrote:
> > >I'm still using greylisting with moderate effects. It catches some
> > >percent other AntiSpam technics doesn't> 
> > even compared to postscreen?
> 
> I would expect that greylisting blocks some spambots before they
> are blacklisted in DNSBLs.
> 
>   Wietse


Re: TLS 1.3 on postfix (fixed)

2019-06-23 Thread Security Admin (NetSec)
" Whatever the default, the logs you posted showed TLS 1.3"


I have noticed that some gmail comes through as TLS 1.2 and some as TLS 1.3; I 
am guessing that not all of Google's SMTP gateways are TLS 1.3 yet...



On 6/22/19, 2:13 PM, "owner-postfix-us...@postfix.org on behalf of Viktor 
Dukhovni"  wrote:



> On Jun 22, 2019, at 2:20 PM, Security Admin (NetSec) 
 wrote:
> 
> One of the other posters was correct; it was a certificate issue.  
Reissued my cert on my postfix SMTP mail gateways.

As expected, the keyUsage you had was only appropriate for a CA,
not a TLS server.

> All seems to be working now.  Gmail defaults to TLS 1.2

Whatever the default, the logs you posted showed TLS 1.3

> I saw some posts that TLS 1.3 still has issues with OpenSSL v1.1.1 and 
postfix 3.3.x

Postfix 3.3 should works fine with TLS 1.3, but Postfix 3.4 has improved
support.

-- 
Viktor.





Re: Greylisting -- current recommendations?

2019-06-23 Thread Wietse Venema
Matus UHLAR - fantomas:
> >Am 22.06.19 um 02:49 schrieb Rich Wales:
> >> Any other suggestions?
> 
> On 22.06.19 14:43, A. Schulze wrote:
> >I'm still using greylisting with moderate effects. It catches some percent 
> >other AntiSpam technics doesn't
> 
> even compared to postscreen?

I would expect that greylisting blocks some spambots before they
are blacklisted in DNSBLs.

Wietse


Re: Greylisting -- current recommendations?

2019-06-23 Thread A. Schulze



Am 23.06.19 um 16:57 schrieb Matus UHLAR - fantomas:
> On 22.06.19 14:43, A. Schulze wrote:
>> I'm still using greylisting with moderate effects. It catches some percent 
>> other AntiSpam technics doesn't
> 
> even compared to postscreen?
yes

while running postscreen and postgrey I still see some connections deferred by 
postgrey...
no more details available on a sunday.

Andreas


Re: Gave up on my ISP, trying to get GMail to work but get - host smtp.gmail.com[64.233.168.108] said: 530-5.5.1 Authentication Required.

2019-06-23 Thread Wietse Venema
Chris Pollock:
> On Sun, 2019-06-23 at 01:21 -0400, Viktor Dukhovni wrote:
> > On Sat, Jun 22, 2019 at 08:56:35PM -0500, Chris Pollock wrote:
> > 
> > > I've spent 3hrs going over and over my settings and can't find
> > > where
> > > I've got a problem. My /etc/postfix/sasl_passwd file contains:
> > > 
> > > smtp.gmail.com:587 chris.pollock1...@gmail.com:
> > > *
> > 
> > Since your relayhost setting is:
> > 
> >   relayhost = [smtp.gmail.com]:587
> > 
> > Your SASL password should (IIRC) be either:
> > 
> >   [smtp.gmail.com]:587 chris.pollock1...@gmail.com:**
> > ***
> > 
> > or
> > 
> >   smtp.gmail.com chris.pollock1...@gmail.com:
> > *
> > 
> > the version without the [], but the port might not work, as it is
> > neither the full destination, nor the underlying host.
> 
> Thank you for the reply Viktor. I've finally got it partially working
> with my GMail account now and most of my cronjob messages are being
> sent and returned to me as before. By adding the [ ] around the
> smtp.gmail.com it started working.
> I still have some that are going to /var/spool/mail/nobody however.
> Headers below:
> 
> From chris.pollock1...@gmail.com  Sun Jun 23 09:01:26 2019
> Return-Path: 
> X-Original-To: root

All mail for root goes to nobody, if you're delivering mail with
procmail or the like.

Postfix expects that UNIX systems are used according this best practice:

- Log in as a real user, not as root.
- Use su (or sudo) for doing root stuff.
- Set up an alias root-> real user, and read mail as the real user.

Wietse


Re: Gave up on my ISP, trying to get GMail to work but get - host smtp.gmail.com[64.233.168.108] said: 530-5.5.1 Authentication Required.

2019-06-23 Thread Chris Pollock
On Sun, 2019-06-23 at 01:21 -0400, Viktor Dukhovni wrote:
> On Sat, Jun 22, 2019 at 08:56:35PM -0500, Chris Pollock wrote:
> 
> > I've spent 3hrs going over and over my settings and can't find
> > where
> > I've got a problem. My /etc/postfix/sasl_passwd file contains:
> > 
> > smtp.gmail.com:587 chris.pollock1...@gmail.com:
> > *
> 
> Since your relayhost setting is:
> 
>   relayhost = [smtp.gmail.com]:587
> 
> Your SASL password should (IIRC) be either:
> 
>   [smtp.gmail.com]:587 chris.pollock1...@gmail.com:**
> ***
> 
> or
> 
>   smtp.gmail.com chris.pollock1...@gmail.com:
> *
> 
> the version without the [], but the port might not work, as it is
> neither the full destination, nor the underlying host.

Thank you for the reply Viktor. I've finally got it partially working
with my GMail account now and most of my cronjob messages are being
sent and returned to me as before. By adding the [ ] around the
smtp.gmail.com it started working.
I still have some that are going to /var/spool/mail/nobody however.
Headers below:

From chris.pollock1...@gmail.com  Sun Jun 23 09:01:26 2019
Return-Path: 
X-Original-To: root
Delivered-To: root@cpollock.localdomain
Received: by cpollock.localdomain (Postfix, from userid 0)
id 3A4991000E12; Sun, 23 Jun 2019 09:01:25 -0500 (CDT)
From: chris.pollock1...@gmail.com (Cron Daemon)
To: root@cpollock.localdomain

Though in my aliases file I have root set:

# Person who should get root's mail.  This alias
# must exist.
# CHANGE THIS LINE to an account of a HUMAN
root:   chris.pollock1...@gmail.com

I'm sure it's something simple and I'll just have to read and reread
until I get it figured out. It was working well under my ISP until they
decided to start doing something to some of my outgoing cron messages
where they weren't being returned and some even marked as spam. 

Chris

-- 
Chris
KeyID 0xE372A7DA98E6705C
31.11972; -97.90167 (Elev. 1092 ft)
09:08:27 up 2 days, 15:18, 1 user, load average: 0.67, 0.95, 0.95
Description:Ubuntu 18.04.2 LTS, kernel 4.18.0-22-generic


signature.asc
Description: This is a digitally signed message part


Re: Unable to send or receive from Gmail

2019-06-23 Thread Matus UHLAR - fantomas

On 22.06.19 15:03, Security Admin (NetSec) wrote:

I figured TLS 1.3 might be the culprit from the logs.  The OpenSSL version shows 
"OpenSSL 1.1.1   11 Sep 2018" and it was updated recently via Ubuntu.

How might I go about not negotiating TLS 1.3, as it is obvious I need to update 
some certificates (which I will worry about later).


have you tried to enforce tls1.3? Lower TLS version should be negotiated if
1.3 negiotiation doesn't succeed.
What are your tls-related options?

--
Matus UHLAR - fantomas, uh...@fantomas.sk ; http://www.fantomas.sk/
Warning: I wish NOT to receive e-mail advertising to this address.
Varovanie: na tuto adresu chcem NEDOSTAVAT akukolvek reklamnu postu.
"Where do you want to go to die?" [Microsoft]


Re: Greylisting -- current recommendations?

2019-06-23 Thread Matus UHLAR - fantomas

Am 22.06.19 um 02:49 schrieb Rich Wales:

Any other suggestions?


On 22.06.19 14:43, A. Schulze wrote:

I'm still using greylisting with moderate effects. It catches some percent 
other AntiSpam technics doesn't


even compared to postscreen?

--
Matus UHLAR - fantomas, uh...@fantomas.sk ; http://www.fantomas.sk/
Warning: I wish NOT to receive e-mail advertising to this address.
Varovanie: na tuto adresu chcem NEDOSTAVAT akukolvek reklamnu postu.
"The box said 'Requires Windows 95 or better', so I bought a Macintosh".


Re: dkim updating keys

2019-06-23 Thread Ralph Seichter
* Esteban L.:

> Trying to figure this out with as little disruption as possible.

I sugest you do the following, in order:

* Generate new key.

* Add new key's data, using a new DKIM selector, to your DNS.

* Wait for your domain zone's DNS TTL to expire (typically 1-2 days).

* Switch to signing with the new key.

* Wait another 1-2 days, in case messages signed with the previous key
  are still in limbo somewhere (low risk of that, but still).

* Remove old key's data from DNS.

As long as you make sure to use a different DKIM selector for each key,
that should suffice for a key rollover.

-Ralph


dkim updating keys

2019-06-23 Thread Esteban L
Friendly Greetings,

I am going to update my email server's Dkim keys for the first time. 

I can go to the original install instructions, and figure out how to
update them. What I can't find in that original tutorial is the
following:

1. Do I delete/remove old key and references thereto? Namely, in the
key.table?

2. Do I just create the new key, and update the key.table, and upload
the txt to my DNS?

3. Do I leave my old key information (including on the DNS) for a
"grace period" of a week or so?

Trying to figure this out with as little disruption as possible.

Thanks in advance.

Esteban 



-- 
https://little-beak.com
"Doing what we can."